TW200637327A - System and method for using a dynamic credential to identify a cloned device - Google Patents

System and method for using a dynamic credential to identify a cloned device

Info

Publication number
TW200637327A
TW200637327A TW094139996A TW94139996A TW200637327A TW 200637327 A TW200637327 A TW 200637327A TW 094139996 A TW094139996 A TW 094139996A TW 94139996 A TW94139996 A TW 94139996A TW 200637327 A TW200637327 A TW 200637327A
Authority
TW
Taiwan
Prior art keywords
server
dynamic credential
communication device
random offset
identify
Prior art date
Application number
TW094139996A
Other languages
English (en)
Chinese (zh)
Inventor
Ivan Hugh Mclean
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of TW200637327A publication Critical patent/TW200637327A/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/081Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying self-generating credentials, e.g. instead of receiving credentials from an authority or from another peer, the credentials are generated at the entity itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)
TW094139996A 2004-11-16 2005-11-14 System and method for using a dynamic credential to identify a cloned device TW200637327A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/990,683 US20060107323A1 (en) 2004-11-16 2004-11-16 System and method for using a dynamic credential to identify a cloned device

Publications (1)

Publication Number Publication Date
TW200637327A true TW200637327A (en) 2006-10-16

Family

ID=36388003

Family Applications (1)

Application Number Title Priority Date Filing Date
TW094139996A TW200637327A (en) 2004-11-16 2005-11-14 System and method for using a dynamic credential to identify a cloned device

Country Status (8)

Country Link
US (1) US20060107323A1 (pt)
EP (1) EP1820104A4 (pt)
JP (1) JP2008521348A (pt)
KR (1) KR100919536B1 (pt)
CN (1) CN101443741A (pt)
BR (1) BRPI0518018A (pt)
TW (1) TW200637327A (pt)
WO (1) WO2006055545A2 (pt)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI424726B (zh) * 2008-06-03 2014-01-21 Ibm 消除中間人電腦駭客技術之方法及系統

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9444839B1 (en) * 2006-10-17 2016-09-13 Threatmetrix Pty Ltd Method and system for uniquely identifying a user computer in real time for security violations using a plurality of processing parameters and servers
US8050260B1 (en) * 2007-01-30 2011-11-01 Qlogic, Corporation Method and system for load balancing in infiniband switches and networks
KR101428037B1 (ko) * 2007-07-03 2014-08-07 엘지전자 주식회사 유해정보 차단 방법 및 시스템
US8495375B2 (en) * 2007-12-21 2013-07-23 Research In Motion Limited Methods and systems for secure channel initialization
US8850211B2 (en) * 2009-04-27 2014-09-30 Qualcomm Incorporated Method and apparatus for improving code and data signing
EP2278513A1 (en) * 2009-07-15 2011-01-26 Nagravision SA Method for preventing the use of a cloned user unit communicating with a server
US20200226012A1 (en) * 2010-06-07 2020-07-16 Affectiva, Inc. File system manipulation using machine learning
US20140357976A1 (en) * 2010-06-07 2014-12-04 Affectiva, Inc. Mental state analysis using an application programming interface
US9582685B2 (en) 2010-11-19 2017-02-28 Nagravision S.A. Method to detect cloned software
US8769627B1 (en) * 2011-12-08 2014-07-01 Symantec Corporation Systems and methods for validating ownership of deduplicated data
US9171140B2 (en) * 2013-03-14 2015-10-27 Blackberry Limited System and method for unified passcode processing
US10694029B1 (en) 2013-11-07 2020-06-23 Rightquestion, Llc Validating automatic number identification data
US9660983B2 (en) * 2014-10-24 2017-05-23 Ca, Inc. Counter sets for copies of one time password tokens
US11615199B1 (en) * 2014-12-31 2023-03-28 Idemia Identity & Security USA LLC User authentication for digital identifications
US9900300B1 (en) * 2015-04-22 2018-02-20 Ionu Security, Inc. Protection against unauthorized cloning of electronic devices
US10805270B2 (en) 2016-09-26 2020-10-13 Agari Data, Inc. Mitigating communication risk by verifying a sender of a message
US10880322B1 (en) 2016-09-26 2020-12-29 Agari Data, Inc. Automated tracking of interaction with a resource of a message
US11936604B2 (en) 2016-09-26 2024-03-19 Agari Data, Inc. Multi-level security analysis and intermediate delivery of an electronic message
US10805314B2 (en) 2017-05-19 2020-10-13 Agari Data, Inc. Using message context to evaluate security of requested data
US11044267B2 (en) 2016-11-30 2021-06-22 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US10715543B2 (en) 2016-11-30 2020-07-14 Agari Data, Inc. Detecting computer security risk based on previously observed communications
US11722513B2 (en) 2016-11-30 2023-08-08 Agari Data, Inc. Using a measure of influence of sender in determining a security risk associated with an electronic message
US11019076B1 (en) 2017-04-26 2021-05-25 Agari Data, Inc. Message security assessment using sender identity profiles
US11102244B1 (en) 2017-06-07 2021-08-24 Agari Data, Inc. Automated intelligence gathering
US11757914B1 (en) 2017-06-07 2023-09-12 Agari Data, Inc. Automated responsive message to determine a security risk of a message sender
US10395053B2 (en) * 2017-12-20 2019-08-27 Gideon Samid Method for inhibiting mass credential theft
US11282066B1 (en) * 2019-01-18 2022-03-22 Worldpay, Llc Systems and methods to provide user verification in a shared user environment via a device-specific display

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3272631A (en) * 1964-01-03 1966-09-13 Du Pont Haze reduction of photographic emulsions containing a covering power agent
US5560008A (en) * 1989-05-15 1996-09-24 International Business Machines Corporation Remote authentication and authorization in a distributed data processing system
JP3590419B2 (ja) * 1994-05-19 2004-11-17 大日本印刷株式会社 Icカード処理装置を用いたicカードのデータの更新方法
AR003524A1 (es) * 1995-09-08 1998-08-05 Cyber Sign Japan Inc Un servidor de verificacion para ser utilizado en la autenticacion de redes de computadoras.
US6006266A (en) * 1996-06-03 1999-12-21 International Business Machines Corporation Multiplexing of clients and applications among multiple servers
US6058482A (en) * 1998-05-22 2000-05-02 Sun Microsystems, Inc. Apparatus, method and system for providing network security for executable code in computer and communications networks
US6256733B1 (en) * 1998-10-08 2001-07-03 Entrust Technologies Limited Access and storage of secure group communication cryptographic keys
US6477645B1 (en) * 1999-02-03 2002-11-05 Intel Corporation Authority and integrity check in systems lacking a public key
US6668327B1 (en) * 1999-06-14 2003-12-23 Sun Microsystems, Inc. Distributed authentication mechanisms for handling diverse authentication systems in an enterprise computer system
US6785262B1 (en) * 1999-09-28 2004-08-31 Qualcomm, Incorporated Method and apparatus for voice latency reduction in a voice-over-data wireless communication system
AU2001230933A1 (en) * 2000-01-14 2001-07-24 Catavault Method and system for secure personal authentication credentials data over a network
US7010690B1 (en) * 2000-07-07 2006-03-07 Sun Microsystems, Inc. Extensible system for building and evaluating credentials
GB0028278D0 (en) * 2000-11-20 2001-01-03 Tao Group Ltd Personal authentication system
US7146635B2 (en) * 2000-12-27 2006-12-05 International Business Machines Corporation Apparatus and method for using a directory service for authentication and authorization to access resources outside of the directory service
US7210167B2 (en) * 2001-01-08 2007-04-24 Microsoft Corporation Credential management
US20030074392A1 (en) * 2001-03-22 2003-04-17 Campbell Yogin Eon Methods for a request-response protocol between a client system and an application server
US20030037237A1 (en) * 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
US7047560B2 (en) * 2001-06-28 2006-05-16 Microsoft Corporation Credential authentication for mobile users
JP2003108417A (ja) * 2001-10-01 2003-04-11 Toshiba Corp データ共有およびデータ配信方法
JP4145118B2 (ja) * 2001-11-26 2008-09-03 松下電器産業株式会社 アプリケーション認証システム
GB2383238B (en) * 2001-12-14 2004-11-10 Hewlett Packard Co Digital document storage
US6996620B2 (en) * 2002-01-09 2006-02-07 International Business Machines Corporation System and method for concurrent security connections
US20030163693A1 (en) * 2002-02-28 2003-08-28 General Instrument Corporation Detection of duplicate client identities in a communication system
US20030188193A1 (en) * 2002-03-28 2003-10-02 International Business Machines Corporation Single sign on for kerberos authentication
US7496952B2 (en) * 2002-03-28 2009-02-24 International Business Machines Corporation Methods for authenticating a user's credentials against multiple sets of credentials
US7185199B2 (en) * 2002-08-30 2007-02-27 Xerox Corporation Apparatus and methods for providing secured communication
JP2004102373A (ja) * 2002-09-05 2004-04-02 Hitachi Ltd アクセス管理サーバ、方法及びプログラム
US7124197B2 (en) * 2002-09-11 2006-10-17 Mirage Networks, Inc. Security apparatus and method for local area networks
US7337318B2 (en) * 2003-02-27 2008-02-26 International Business Machines Corporation Method and apparatus for preventing rogue implementations of a security-sensitive class interface
US7190948B2 (en) * 2003-03-10 2007-03-13 Avaya Technology Corp. Authentication mechanism for telephony devices
US7299354B2 (en) * 2003-09-30 2007-11-20 Intel Corporation Method to authenticate clients and hosts to provide secure network boot
US7155726B2 (en) * 2003-10-29 2006-12-26 Qualcomm Inc. System for dynamic registration of privileged mode hooks in a device
US7120794B2 (en) * 2003-10-29 2006-10-10 Qualcomm Inc. System for invoking a privileged function in a device
US7373502B2 (en) * 2004-01-12 2008-05-13 Cisco Technology, Inc. Avoiding server storage of client state

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI424726B (zh) * 2008-06-03 2014-01-21 Ibm 消除中間人電腦駭客技術之方法及系統

Also Published As

Publication number Publication date
KR20070086323A (ko) 2007-08-27
KR100919536B1 (ko) 2009-10-01
WO2006055545A2 (en) 2006-05-26
US20060107323A1 (en) 2006-05-18
JP2008521348A (ja) 2008-06-19
CN101443741A (zh) 2009-05-27
EP1820104A2 (en) 2007-08-22
BRPI0518018A (pt) 2008-10-21
EP1820104A4 (en) 2011-09-07
WO2006055545A3 (en) 2009-04-02

Similar Documents

Publication Publication Date Title
TW200637327A (en) System and method for using a dynamic credential to identify a cloned device
TW200640220A (en) System and method for providing a multi-credential authentication protocol
GB2433863B (en) System and method for data synchronization over a network using a presentation level protocol
ATE489679T1 (de) Sicheres durchqueren von netzkomponenten
GB2495877B (en) Distributed implementation of dynamic wireless traffic policy
GB2424559B (en) Systems and methods for adaptive authentication
WO2010063091A3 (en) System and methods for online authentication
AU8097501A (en) Systems and methods for authenticating a user to a web server
AU2003269214A1 (en) Method and apparatus for relaying session information from a portal server
GB0509335D0 (en) Communicating between a server and browsing clients
SG108824A1 (en) Interception method and system for compensating disadvantageous characteristics of a communication protocol
HK1149862A1 (en) Single sign-on method, single sign-on system and relevant device
TW200719162A (en) Network system, proxy server, session management method, and program
WO2007092401A3 (en) Utilizing a token for authentication with multiple secure online sites
WO2008030527A3 (en) Systems and methods for acquiring network credentials
WO2009065154A3 (en) Method of and apparatus for protecting private data entry within secure web sessions
WO2012064856A3 (en) Methods for reducing latency in network connections and systems thereof
WO2012058317A3 (en) System and method for assuring identity on a mobile device
WO2007027227A3 (en) System and method for optimizing network communication in response to network conditions
WO2009086199A3 (en) Method and system for managing the reception of messages in a communication network
ATE388571T1 (de) Fernverwaltung von ipsec-sicherheitsassoziationen
WO2011056315A3 (en) Systems and methods for secure access to remote networks utilizing wireless networks
ATE429768T1 (de) Sichere datenkommunikation in web-diensten
IL145105A0 (en) A method and system for providing a web service by a plurality of web domains through a single ip address
GB2477889A (en) Method and arrangements in a communication network